Systems for network risk assessment including processing of user access rights associated with a network of devices
First Claim
1. A computerized method comprising:
- determining, by a system of one or more computers configured to be in communication with a network comprising a plurality of network devices, a network topology of the network based on information describing network traffic, the network topology comprising a plurality of nodes each connected by an edge to one or more of the plurality of nodes, and each node being associated with one or more network devices;
determining, by the system and for each node, respective compromise risks of network devices associated with the node;
providing, by the system and for presentation in a user interface, visual representations of the plurality of nodes and associated compromise risks, wherein the visual representations are colored according to associated compromise risks, and wherein the colors are selected according to user specified thresholds of values of comprises risks; and
receiving, by the system, user selection of a visual representation of a node, and updating the user interface to present detailed information describing the compromise risks associated with the selected node.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network. A network topology of the network is determined based on the information describing network traffic, with the network topology including nodes connected by an edge to one or more other nodes, and with each node being associated with one or more network devices. Indications of user access rights of users are associated to respective nodes included in the network topology. User interface data associated with the network topology is generated.
185 Citations
20 Claims
-
1. A computerized method comprising:
-
determining, by a system of one or more computers configured to be in communication with a network comprising a plurality of network devices, a network topology of the network based on information describing network traffic, the network topology comprising a plurality of nodes each connected by an edge to one or more of the plurality of nodes, and each node being associated with one or more network devices; determining, by the system and for each node, respective compromise risks of network devices associated with the node; providing, by the system and for presentation in a user interface, visual representations of the plurality of nodes and associated compromise risks, wherein the visual representations are colored according to associated compromise risks, and wherein the colors are selected according to user specified thresholds of values of comprises risks; and receiving, by the system, user selection of a visual representation of a node, and updating the user interface to present detailed information describing the compromise risks associated with the selected node. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. The computerized method of 1, wherein the visual representations comprise circles.
-
8. A system comprising one or more computer systems and one or more computer storage media storing instructions that when executed by the computer systems cause the computer systems to perform operations comprising:
-
determining, by the system configured to be in communication with a network comprising a plurality of network devices, a network topology of the network based on information describing network traffic, the network topology comprising a plurality of nodes each connected by an edge to one or more of the plurality of nodes, and each node being associated with one or more network devices; determining, by the system and for each node, respective compromise risks of network devices associated with the node; providing, by the system and for presentation in a user interface, visual representations of the plurality of nodes and associated compromise risks, wherein the visual representations are visually differentiated according to associated compromise risks, and wherein the visual differentiations are selected according to user specified thresholds of values of compromise risks; and receiving, by the system, user selection of a visual representation of a node, and updating the user interface to present detailed information describing the compromise risks associated with the selected node. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. Non-transitory computer storage media storing instruction that when executed by a system of one or more computers, cause the one or more computers to perform operations comprising:
-
determining, by the system configured to be in communication with a network comprising a plurality of network devices, a network topology of the network based on information describing network traffic, the network topology comprising a plurality of nodes each connected by an edge to one or more of the plurality of nodes, and each node being associated with one or more network devices; determining, by the system and for each node, respective compromise risks of network devices associated with the node; providing, by the system and for presentation in a user interface, visual representations of the plurality of nodes and associated compromise risks, wherein the visual representations are visually differentiated according to associated compromise risks, and wherein the visual differentiations are selected according to user specified thresholds of values of compromise risks; and receiving, by the system, user selection of a visual representation of a node, and updating the user interface to present detailed information describing the compromise risks associated with the selected node. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification